Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-32938 β€” AI Deep Analysis Summary

CVSS 9.9 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Path Traversal in SiYuan's `/api/lute/html2BlockDOM` endpoint. <br>πŸ”₯ **Consequences**: Sensitive file leakage.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). <br>πŸ” **Flaw**: The API endpoint fails to validate or sanitize file paths provided in requests, allowing directory traversal sequences.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: SiYuan Note. <br>πŸ“‰ **Affected Versions**: SiYuan **v3.6.0 and earlier**. <br>βœ… **Fixed In**: v3.6.1.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Action**: Read arbitrary files on the host system. <br>πŸ“‚ **Data Impact**: High Confidentiality impact (C:H). Attackers can access sensitive configuration files, user data, or other restricted resources.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Auth Required**: Yes. CVSS vector `PR:L` (Privileges Required: Low). <br>βš™οΈ **Config**: Network Accessible (`AV:N`). Requires local user privileges but no complex setup.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: No PoC provided in the data (`pocs: []`). <br>🌐 **Wild Exploit**: Unlikely to be widespread yet, as no public exploit code is available.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for SiYuan instances running v3.6.0 or older.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Patch**: Yes. Fixed in **v3.6.1**. <br>πŸ”— **Reference**: GitHub commit `294b8b4` and release notes. Update immediately.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If unable to update, restrict network access to the SiYuan service. <br>🚫 **Mitigation**: Block external access to the `/api/lute/` endpoints via firewall or reverse proxy rules.

Q10Is it urgent? (Priority Suggestion)

⚑ **Priority**: **HIGH**. <br>πŸ“… **Urgency**: CVSS Score indicates High Impact (C:H, A:H). Since a patch exists, upgrade immediately to prevent potential data breaches.